F2 Functionality Identification

 Identifying common cryptographic algorithms in binaries through, for example, use of standard constants and common instructions. 


Identifying network send/receive loops 


Infection vectors and persistence mechanisms

Comments

Popular posts from this blog

CREST Practitioner Intrusion Analyst: CPIA Exam Information

A1 Engagement Lifecycle Management